Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Expression And Reception: An Analytic Method For Assessing Message Production And Consumption In Cmc, Kang Namkoong, Dhavan V. Shah, Bryan Mclaughlin, Ming-Yuan Chih, Tae Joon Moon, Shawnika Hull, David H. Gustafson Apr 2017

Expression And Reception: An Analytic Method For Assessing Message Production And Consumption In Cmc, Kang Namkoong, Dhavan V. Shah, Bryan Mclaughlin, Ming-Yuan Chih, Tae Joon Moon, Shawnika Hull, David H. Gustafson

Community & Leadership Development Faculty Publications

This article presents an innovative methodology to study computer-mediated communication (CMC), which allows analysis of the multi-layered effects of online expression and reception. The methodology is demonstrated by combining the following three data sets collected from a widely tested eHealth system, the Comprehensive Health Enhancement Support System (CHESS): (1) a flexible and precise computer-aided content analysis; (2) a record of individual message posting and reading; and (3) longitudinal survey data. Further, this article discusses how the resulting data can be applied to online social network analysis and demonstrates how to construct two distinct types of online social networks—open and targeted …


Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li Mar 2017

Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li

Information Science Faculty Publications

Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …


Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng Mar 2017

Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng

Information Science Faculty Publications

Based on the Information-Centric Networking (ICN) concept and the mature model of the current TCP/IP-based Internet, we propose content searching based on universal and scalable resource description, namely ISBORD (Internet Searching based on Resource Description). This novel concept aims to improve the efficiency of content searching and simplifies the end-user functionality to support the evolution of the content-centric Internet.